×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
The C# program should not be vulnerable to SQL Injection attacks if the C# programmer was following the decades long advise of using parameterized SQL.
If they did not use parameterized SQL, you should get your money back.
FYI: If you do not use parameterized SQL querys in Java, C#, PHP, etc then they are all vulnerable to SQL injection attacks.
-----Original Message-----
From: Cyndi Bradberry [mailto:CyndiB@xxxxxxxx]
Sent: Monday, August 7, 2017 4:05 PM
To: midrange-l@xxxxxxxxxxxx
Subject: RE: Logging of SQL statements
We have C# running on Microsoft IIS handling our web services. They have found they are vulnerable to SQL injection attacks. They are working on programming their sites to not allow it, but we would like to have a belt and suspenders approach.
The files are journaled, but they really want to capture the entire SQL string if possible. I will look into the QIBM_QZDA_SQL1 and database monitoring.
Thanks for the suggestions.
Cyndi B.
Boise, ID
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
visit:
http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at
http://archive.midrange.com/midrange-l.
Please contact support@xxxxxxxxxxxx for any subscription related questions.
Help support midrange.com by shopping at amazon.com with our affiliate link:
http://amzn.to/2dEadiD
As an Amazon Associate we earn from qualifying purchases.